Targeted by Data Thieves

Perez, Eduardo
October 2009
Hospitality Upgrade;Autumn2009, p118
Trade Publication
The article focuses on the protection of hotel guests in the U.S. from data security breaches. The role of merchant payment networks of being the main transmitter of cardholder data between systems is known to criminals. Network security guidelines have been prescribed by the Payment Card Industry Data Security Standard (PCI DSS).


Related Articles

  • On Approaches for Detection and Resolution of Buffer Overflow Attacks. Nayak, Lopamudra; Meghanathan, Natarajan // International Journal of Research & Reviews in Computer Science;Dec2010, Vol. 1 Issue 4, p20 

    The Buffer Overflow attack is one of the most predominant security breaches that are launched with a malicious intent of disrupting the normal flow of execution of a software program/system. Hence, it generates a lot of interest in the research community. To counter this attack, several methods...

  • Trinoo Attack.  // Network Dictionary;2007, p496 

    A definition of the term "trinoo attack" is presented. It refers to a distributed denial of service (DDoS) attack that uses a User Datagram Protocol (UDP) flood to disable the victim. A trinoo network consists of an attacker system, several compromised systems, that could include one or more...

  • Facebook users warned over data exposure.  // Enterprise Innovation;Oct2007, Vol. 3 Issue 5, p10 

    The article reports that security provider Sophos has warned the users of social networking tool, Facebook for unprotected data exposure on personal or corporate information to strangers. Sophos told Facebook to improve its default security and privacy settings following the research that showed...

  • Insiders. Wolfe, Daniel // American Banker;7/23/2008, Vol. 173 Issue 141, p5 

    The article offers security news briefs. Terry Childs is accused of hijacking access to a major San Francisco government computer network. The Web site "Wired.com" reports that the San Francisco incident is comparably minor. William G. Sullivan was sentenced to 57 months in prison for reselling...

  • Learn from these mistakes. Castle, Ian // SC Magazine: For IT Security Professionals (UK Edition);Jun2008, p19 

    The article focuses on the most computer security mistakes by developers, administrators and operators. Some information security professionals have failed to recognize the importance of patching the non-default applications as well as the standard ones. The next most common mistake is to forget...

  • Post-Breach Data Security: Increased Budgets, Expanded Requirements.  // Security: Solutions for Enterprise Security Leaders;Feb2014, Vol. 51 Issue 2, p12 

    The article reports on the "Understand The State of Network Security: 2013 To 2014" study conducted by research and analysis information technology company Forrester Research regarding the implementation of information security. Topics discussed include changes following security breach,...

  • Key Steps To Surviving Your First Data Breach. Schreiber, Joe // Database & Network Journal;Apr2015, Vol. 45 Issue 2, p22 

    The article offers suggestions for enhancing the survival rate at first data breach. Topics discussed include protecting the company's assets by ensuring computer network security, establishing a relationship and understanding how jobs interact during a breach; and analyzing how the computer...

  • The Threat Within: Data Breaches from Unauthorized Access and Improper Use. Sweeney, Geoff // MicroScope;3/24/2008, p4 

    This article focuses on the data breach risk facing chief information officers (CIO) through inappropriate behaviour by someone who is authorised to access the network and its information. According to the author, the issue for the company is more immediate because it needs to be able to...

  • Internal Security Audits Crucial to Preventing Breaches: PwC.  // CIO Insight;8/16/2012, p1 

    The article discusses the whitepaper from PricewaterhouseCoopers LLP (PwC) which reveals the crucial role of internal security audits in preventing security breaches. It suggests that a strong internal audit can bolster security and forestall network breaches. PwC's partner Carolyn Holcomb has...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics